Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If an architecture results in persistent and pervasive misuse, the problem isn't the misuse, the problem is the architecture.


I agree 100%, I’m just hypothesising why it could have ended up like that, and if there’s a way to have something “registry-like” without the observed flaws.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: